Home
last modified time | relevance | path

Searched refs:certificate (Results 1 – 25 of 95) sorted by relevance

1234

/OK3568_Linux_fs/u-boot/lib/avb/libavb_atx/
H A Davb_atx_validate.c152 const AvbAtxCertificate* certificate, in verify_certificate() argument
159 if (certificate->signed_data.version != 1) { in verify_certificate()
164 sha512((const uint8_t*)&certificate->signed_data, in verify_certificate()
169 certificate->signature, in verify_certificate()
178 if (certificate->signed_data.key_version < minimum_key_version) { in verify_certificate()
182 if (0 != avb_safe_memcmp(certificate->signed_data.usage, in verify_certificate()
193 const AvbAtxCertificate* certificate, in verify_pik_certificate() argument
200 certificate, authority, minimum_version, expected_usage)) { in verify_pik_certificate()
209 const AvbAtxCertificate* certificate, in verify_psk_certificate() argument
218 certificate, authority, minimum_version, expected_usage)) { in verify_psk_certificate()
[all …]
/OK3568_Linux_fs/kernel/certs/
H A DKconfig9 Provide the file name of a private key/certificate in PEM format,
11 the URI should identify, both the certificate and its corresponding
16 certificate as described in Documentation/admin-guide/module-signing.rst
37 system keyring. Any certificate used for module signing is implicitly
45 bool "Reserve area for inserting a certificate without recompiling"
48 If set, space for an extra certificate will be reserved in the kernel
49 image. This allows introducing a trusted certificate to the default
53 int "Number of bytes to reserve for the extra certificate"
58 certificate to be inserted.
93 be checked to see if it matches such a certificate.
/OK3568_Linux_fs/kernel/security/integrity/evm/
H A DKconfig59 bool "Load an X509 certificate onto the '.evm' trusted keyring"
63 Load an X509 certificate onto the '.evm' trusted keyring.
65 This option enables X509 certificate loading from the kernel
70 string "EVM X509 certificate path"
74 This option defines X509 certificate path.
/OK3568_Linux_fs/buildroot/package/weston/
H A D0087-backend-vnc-enable-TLS-support.patch6 Add TLS key and certificate parameters to enable encryption support.
26 + " --vnc-tls-cert=FILE\tThe file containing the certificate for TLS encryption\n"
76 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
120 +to ship a file containing a certificate.
123 +The file containing the certificate for doing TLS security. To have TLS security you also need
130 +You can generate a key and certificate file to use with TLS security using typical
H A D0089-backend-vnc-Add-user-authentication.patch60 - weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
79 + weston_log("The VNC backend requires a key and a certificate for TLS security"
84 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
H A D0091-HACK-vnc-Make-pam-optional.patch39 weston_log("The VNC backend requires a key and a certificate for TLS security"
47 weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
/OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/
H A D0088-backend-vnc-enable-TLS-support.patch6 Add TLS key and certificate parameters to enable encryption support.
26 + " --vnc-tls-cert=FILE\tThe file containing the certificate for TLS encryption\n"
76 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
120 +to ship a file containing a certificate.
123 +The file containing the certificate for doing TLS security. To have TLS security you also need
130 +You can generate a key and certificate file to use with TLS security using typical
H A D0090-backend-vnc-Add-user-authentication.patch60 - weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
79 + weston_log("The VNC backend requires a key and a certificate for TLS security"
84 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
H A D0092-HACK-vnc-Make-pam-optional.patch39 weston_log("The VNC backend requires a key and a certificate for TLS security"
47 weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
/OK3568_Linux_fs/kernel/Documentation/crypto/
H A Dasymmetric-keys.rst108 PGP-specific metadata, whereas X.509 has arbitrary certificate identifiers.
372 This allows for verification of certificate chains by adding each
373 certificate in order (starting closest to the root) to a keyring. For
376 certificate chain to be validated::
383 # Create and restrict a keyring for the certificate chain
387 # Attempt to add each certificate in the chain, starting with the
388 # certificate closest to the root.
393 If the final end-entity certificate is successfully added to the "chain"
398 restricting the keyring after linking the root certificate::
400 # Create a keyring for the certificate chain and add the root
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/files/
H A DCVE-2022-40617.patch15 certificate with a CDP that points to a server that completes the
21 The logging during the certificate verification obviously changes.
83 DBG1(DBG_CFG, " using trusted ca certificate \"%Y\"",
97 + "trusted certificate \"%Y\"",
/OK3568_Linux_fs/kernel/drivers/staging/greybus/
H A Dauthentication.c103 u8 *certificate, u32 *size, u8 *result) in cap_get_ims_certificate() argument
133 memcpy(certificate, response->certificate, *size); in cap_get_ims_certificate()
230 ims_cert->certificate, in cap_ioctl()
H A Dgreybus_authentication.h56 __u8 certificate[CAP_CERTIFICATE_MAX_SIZE]; member
/OK3568_Linux_fs/kernel/Documentation/process/
H A Dembargoed-hardware-issues.rst40 certificate. The list's PGP key and S/MIME certificate are available from
278 list's PGP key or with the list's S/MIME certificate. The mailing-list
280 subscriber with the subscriber's PGP key or S/MIME certificate. Details
289 the key and S/MIME certificate are conveyed to the subscribers by email
301 certificate. If a PGP key is used, it must be available from a public key
308 or the list's S/MIME certificate. The subscriber's email client can extract
309 the PGP key or the S/MIME certificate from the signature so the subscriber
/OK3568_Linux_fs/kernel/crypto/asymmetric_keys/
H A Dpkcs7.asn141 -- Certificates and certificate lists
46 certificate Certificate, -- X.509
H A DKconfig38 tristate "X.509 certificate parser"
45 public key packet found inside the certificate.
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/ca-certificates/
H A D0001-Revert-mozilla-certdata2pem.py-print-a-warning-for-e.patch25 * Blacklist expired root certificate "DST Root CA X3" (closes: #995432)
72 - print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/uw-imap/uw-imap/
H A D0001-Support-OpenSSL-1.1.patch23 /* disable certificate validation? */
65 else ret = "Unable to locate common name in certificate";
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/
H A DCVE-2022-27782-1.patch185 + char *CRLfile; /* CRL to check certificate revocation */
198 BIT(verifystatus); /* set TRUE if certificate status must be checked */
202 long certverifyresult; /* result from the certificate verification */
203 - char *CRLfile; /* CRL to check certificate revocation */
206 char *cert_type; /* format for certificate (default: PEM)*/
216 BIT(certinfo); /* gather lots of certificate info */
301 failf(data, "server certificate verification failed. CAfile: %s "
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/
H A D0001-raddb-certs-Makefile-fix-the-existed-certificate-err.patch4 Subject: [PATCH] raddb/certs/Makefile: fix the existed certificate error
13 ERROR:There is already a certificate for /C=FR/ST=Radius/O=Example Inc./CN=user@example.org/emailAd…
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/
H A Dca-certificates_20211016.bb53 echo "# Lines starting with ! will remove certificate on next update"
75 # we just run update-ca-certificate from do_install() for nativesdk.
/OK3568_Linux_fs/buildroot/package/ca-certificates/
H A DConfig.in8 It includes, among others, certificate authorities used by the
/OK3568_Linux_fs/buildroot/package/libaacs/
H A DConfig.in9 NB: this project doesn't offer any key or certificate that
/OK3568_Linux_fs/buildroot/package/luaossl/
H A DConfig.in10 It includes support for certificate and key management,
/OK3568_Linux_fs/buildroot/package/libbdplus/
H A DConfig.in13 certificate that could be used to decode encrypted copyrighted

1234